US11463360B2 - System and method for range matching - Google Patents

System and method for range matching Download PDF

Info

Publication number
US11463360B2
US11463360B2 US16/853,312 US202016853312A US11463360B2 US 11463360 B2 US11463360 B2 US 11463360B2 US 202016853312 A US202016853312 A US 202016853312A US 11463360 B2 US11463360 B2 US 11463360B2
Authority
US
United States
Prior art keywords
hash table
address
key
ranges
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US16/853,312
Other versions
US20200296041A1 (en
Inventor
Yitshak Yishay
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cognyte Technologies Israel Ltd
Original Assignee
Cognyte Technologies Israel Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cognyte Technologies Israel Ltd filed Critical Cognyte Technologies Israel Ltd
Priority to US16/853,312 priority Critical patent/US11463360B2/en
Assigned to VERINT SYSTEMS LTD. reassignment VERINT SYSTEMS LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YISHAY, YITSHAK
Publication of US20200296041A1 publication Critical patent/US20200296041A1/en
Assigned to Cognyte Technologies Israel Ltd reassignment Cognyte Technologies Israel Ltd CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: VERINT SYSTEMS LTD.
Assigned to Cognyte Technologies Israel Ltd reassignment Cognyte Technologies Israel Ltd CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: VERINT SYSTEMS LTD.
Application granted granted Critical
Publication of US11463360B2 publication Critical patent/US11463360B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • H04L45/7453Address table lookup; Address filtering using hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4552Lookup mechanisms between a plurality of directories; Synchronisation of directories, e.g. metadirectories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/35Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function

Definitions

  • the present disclosure relates generally to communication analysis, and particularly to methods and systems for IP address range matching.
  • Range matching is useful, for example, in communication packet analysis, packet routing, firewalls, Intrusion Detection Systems (IDS) and many other applications.
  • Various range matching techniques are known in the art. For example, Zheng et al. describes techniques for finding all the keys in a certain range over an underlying Peer-to-Peer (P2P) network, in “Distributed Segment Tree: Support of Range Query and Cover Query over DHT,” Electronic publications of the 5 th International Workshop on Peer-to-Peer Systems (IPTPS'06), 2006, which is incorporated herein by reference.
  • U.S. Pat. No. 7,394,809 whose disclosure is incorporated herein by reference, describes a packet classifier having a forest of hash tables.
  • the forest of hash tables includes a number of hash tables, each hash table having a bit mask corresponding to an equivalent set of rules.
  • Each hash table includes a number of entries, wherein an entry of a hash table may correspond to a rule.
  • One or more of the hash tables may include a marker in one entry, wherein the marker identifies another one of the hash tables.
  • the hash table identified by the marker is a descendant of the hash table in which the marker is placed.
  • An embodiment that is described herein provides a method including pre-processing a definition of one or more ranges of addresses, so as to generate a hash table that is queried by a key produced by applying a template to an address, wherein the hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the hash table again.
  • a first key is produced by applying a first template to an input address, and querying the hash table with the first key. Depending on the result, either the result is output, or the hash table is queried again in accordance with the updated template specified in an entry of the hash table corresponding to the first key.
  • querying the hash table again includes, if the result given in the entry corresponding to the first key is inconclusive, applying the updated template specified in the entry to the input address to produce a second key, and querying the hash table again with the second key.
  • the method includes concluding that the input address does not fall in any of the ranges, if the first key does not match any of the entries in the hash table.
  • the first template specifies a first subset of bits of the input address to be included in the first key
  • the second template specifies a second subset of the bits of the input address, different from the first subset, to be included in the second key.
  • at least one entry of the hash table specifies a logical condition that, when applied to the input address, produces a conclusive result of whether the input address falls within one or more of the ranges.
  • the logical condition specifies one or more sub-ranges for checking against the address.
  • At least one entry of the hash table specifies multiple address sub-ranges that correspond to multiple respective conclusive results.
  • the conclusive result further indicates at least one of the ranges in which the address falls.
  • the ranges are assigned respective priorities, and pre-processing the definition comprises defining the hash table so as to return range-matching results in accordance with the priorities.
  • the method includes updating the entries to reflect a change in the ranges, without interrupting access to the entries.
  • an apparatus including a memory and a processor.
  • the memory is configured to hold, for a definition of one or more ranges of addresses, a hash table that is queried by a key produced by applying a template to an address, wherein the hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the hash table again.
  • the processor is configured to pre-process the definition so as to generate the hash table, to produce a first key by applying a first template to an input address, to query the hash table with the first key, and, depending on the result, to either output the result or to query the hash table again in accordance with the updated template specified in an entry of the hash table corresponding to the first key.
  • a computer software product including a tangible non-transitory computer-readable medium in which program instructions are stored, which instructions, when read by a processor, cause the processor to pre-process a definition of one or more ranges of addresses so as to generate a hash table that is queried by a key produced by applying a template to an address, wherein the hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the hash table again, to produce a first key by applying a first template to an input address, and querying the hash table with the first key, and, depending on the result, to either output the result or to query the hash table again in accordance with the updated template specified in an entry of the hash table corresponding to the first key.
  • FIG. 1 is a block diagram that schematically illustrates a communication analytics system, in accordance with an embodiment that is described herein;
  • FIG. 2 is a flow chart that schematically illustrates a method for IP address range matching, in accordance with an embodiment that is described herein.
  • Embodiments that are described herein provide improved methods and systems for range matching.
  • the embodiments described herein refer mainly to range matching of addresses, e.g., Internet Protocol (IP) addresses, in a communication analytics system.
  • IP Internet Protocol
  • the disclosed techniques are not limited to this particular application, and may be used for range matching of any other suitable numerical values.
  • the system holds a definition of one or more ranges of IP addresses.
  • the definition may specify any desired number of ranges of any suitable size, and some ranges may overlap one another or be contained in one another.
  • the definition may also specify certain returned values and/or relative priorities for the various ranges.
  • the system carries out a pre-processing phase, which derives from the definition a hash table that is subsequently queried with addresses to be range-matched.
  • the hash table may be updated at run-time, e.g., in response to changes in the range definition.
  • the system receives addresses (e.g., extracts addresses from monitored communication traffic) and identifies by querying the hash table, for each address, whether the address falls within any of the ranges. If so, the system typically also identifies which of the ranges contains the address. This process is referred to herein as “range matching.”
  • the hash table constructed during the pre-processing phase also accounts for the specified priorities among ranges, without requiring additional effort at run-time.
  • the hash table is designed to be accessed with a key that is produced by applying a template to the address to be range-matched.
  • the template comprises a mask that defines a subset of the bits of the address.
  • a given entry of the hash table may provide a conclusive or inconclusive result.
  • a conclusive result may comprise either a positive match indicating the range or ranges containing the address, or a negative match indicating that the address does not fall within any of the ranges.
  • An inconclusive result indicates that it is not possible to decide on a positive or negative match using the currently-used key.
  • an entry that returns an inconclusive result also specifies an updated template (e.g., mask) that should be applied to the address before accessing the hash table again.
  • the system applies an initial template to the address, and accesses the hash table with the resulting key. If the hash-table entry corresponding to the key indicates a conclusive result, the system outputs or acts upon the result, and the process terminates. If the hash-table entry indicates an inconclusive result, the system extracts an updated template from the hash-table entry, generates an updated key by applying the updated template to the address, and accesses the hash table again using the updated key.
  • the system may need to access the hash table multiple times until achieving a conclusive (positive or negative) match.
  • Each access of the hash table uses a different template (and therefore a different key), as specified in the previously-visited hash-table entry.
  • an entry that returns an inconclusive result specifies a logical condition instead of an updated template.
  • the logical condition may specify, for example, a positive match if the IP address falls in some specified sub-range, and a negative match otherwise. Applying the logical condition to the address thus yields a conclusive match.
  • the hash table In designing the disclosed hash table structures, it is possible to trade memory size against computational complexity and matching speed. For a given set of address ranges, if the hash table is designed with a large number of entries (i.e., large memory space), the average number of repeated accesses to the table is reduced (i.e., high range-matching speed). The extreme case would be to generate hash-table entries per each value in the range-A design that would require extremely large memory but incur no repeated accesses. This sort of solution is not feasible in most cases, since memory resources are limited. For example, to meet throughput and latency goals, it is advantageous for the hash table to fit into a small processor cache memory. At the other extreme, when the number of entries is small (i.e., small memory space), the average number of repeated accesses to the table is increased (i.e., reduced range-matching speed). Intermediate designs are similarly applicable.
  • the disclosed range matching techniques enable straightforward tuning of performance to match desired speed and memory space requirements, and also lend themselves to smooth and seamless reconfiguration of the hash table.
  • FIG. 1 is a block diagram that schematically illustrates a communication analytics system 20 , in accordance with an embodiment that is described herein.
  • System 20 monitors and analyzes communication packets that are exchanged over a communication network 24 , such as the Internet.
  • system 20 extracts Internet Protocol (IP) addresses from the monitored packets, and performs a range matching process on the IP addresses. The system may then decide how to handle the packets depending on the range matching results. For example, system 20 may hold a definition of ranges of IP addresses that are of interest, and analyze only packets whose IP addresses fall inside one of the ranges of interest.
  • IP Internet Protocol
  • system 20 may hold a definition of ranges of IP addresses that are of interest, and analyze only packets whose IP addresses fall inside one of the ranges of interest.
  • the disclosed range matching techniques can be used in routers or other network elements that route the packets depending on the range-matching results.
  • system 20 comprises a network interface 28 for monitoring packets exchanged over network 24 , and a processor 32 that is configured to carry out the range matching processes described herein.
  • Processor 32 comprises a pre-processing unit 38 that performs the pre-processing phase described above, an address extraction unit 36 that extracts IP addresses from monitored packets at run-time, and a range matching unit 40 that applies range matching to the extracted addresses.
  • Unit 40 produces match results that are used by system 20 for subsequent processing, e.g., to decide which packets to discard and which to analyze.
  • Processor further comprises a memory 44 that stores a hash table.
  • Memory 44 may comprise any suitable memory type.
  • the hash table is kept sufficiently small to fit in the Random Access Memory (RAM) cache memory of processor 32 .
  • RAM Random Access Memory
  • Hash table 44 has a unique structure that enables rapid and efficient range matching, as will be described in detail below.
  • the configurations of system 20 shown in FIG. 1 is as example configuration that is chosen purely for the sake of conceptual clarity.
  • any other suitable system configuration can be used.
  • the embodiments described herein refer mainly to IP addresses, and are applicable, for example, in IPv4 or IPv6 networks.
  • the disclosed techniques are not limited to range matching of IP addresses, and can be used for range matching of other types of addresses.
  • the disclosed techniques can generally be used for range matching of any other suitable numerical values (e.g., packet lengths or port numbers), either instead of or in addition to address range matching.
  • range matching is performed in multiple dimensions (e.g., both IP address and port number), the system would typically carry out the process one dimension at a time.
  • Certain elements of system 20 can be implemented using hardware, such as using one or more Application-Specific Integrated Circuits (ASICs) or Field-Programmable Gate Arrays (FPGAs) or other device types. Additionally or alternatively, certain elements of system 20 can be implemented using software, or using a combination of hardware and software elements.
  • ASICs Application-Specific Integrated Circuits
  • FPGAs Field-Programmable Gate Arrays
  • processor 32 comprises a general-purpose computer, which is programmed in software to carry out the functions described herein.
  • the software may be downloaded to the computer in electronic form, over a network, for example, or it may, alternatively or additionally, be provided and/or stored on non-transitory tangible media, such as magnetic, optical, or electronic memory.
  • processor 32 receives and stores a definition of one or more ranges of IP address of interest. Unit 38 pre-processes this definition so as to produce hash table 44 .
  • the definition may specify any number of ranges, and each range may be of any suitable size. Ranges may be disjoint, overlapping or contained in one another, as desired. The ranges may be assigned respective relative priorities.
  • each range is represented using the notation X1.X2.X3.X4/N, wherein X1.X2.X3.X4 denotes a 32-bit IP address (X1 . . . X4 are integer numbers between 0 and 255), and N denotes the number of Most Significant Bits (MSBs) that span the range.
  • MSBs Most Significant Bits
  • 56.176.23.14/32 denotes a range that includes the single address 56.176.23.14.
  • the disclosed techniques can be used with any other suitable notation.
  • the definition may comprise the following three ranges:
  • the range matching process may return one of two possible results: Either the address falls in the range (together with the identities of the range(s) in which the address falls); or the address does not fall in the range.
  • processor 32 carries out a pre-processing phase that translates the range definition into hash table 44 .
  • the processor later checks whether a given address falls in one or more of the ranges by querying the hash table.
  • Hash table 44 is designed to be accessed by a key, which is generated by applying a template to the address.
  • the template comprises a bit mask
  • the processor generates the key by calculating a bit-wise AND between the bit mask and the address.
  • any other suitable template can be used.
  • One example is a “DEV” operator used with non-binary numbers.
  • processor 32 translates this range definition into the following hash table:
  • the template comprises an 8-bit mask that selects the eight most-significant bits of the IP address and masks the other bits.
  • the key for accessing the table comprises the eight most-significant bits of the address.
  • any other suitable number of bits can be used, typically depending on the pre-processing phase.
  • the first entry of Table 1 indicates that all addresses that match the key (i.e., all addresses of the form 102.X.X.X) fall inside range R1.
  • the second entry indicates that all addresses of the form 103.X.X.X also fall inside range R1. Note that this information was implicit in the original range definition, and was added by the processor when constructing the hash table.
  • the third entry in Table 1 indicates that addresses whose upper sixteen bits are between 104.160 and 104.175 fall in the range R1.
  • the “SCENARIO” attribute indicates the partial subset of the addresses matching the key (104) that are handled by this entry.
  • the hash-table entry specifies a simple sub-range checking.
  • the fourth entry indicates that all addresses of the form 106.X.X.X fall in range R1.
  • the fifth entry in Table indicates that addresses between 179.1.2.0 and 179.1.2.255 fall in the range R1.
  • the “SCENARIO” attribute indicates the partial subset of the addresses matching the key (179) that are handled by this entry.
  • the hash table in addition to a positive result indicating that the address falls in one of the ranges, the hash table also returns the identity of the range or ranges in which the address falls.
  • processor 32 divides the ranges in the definition into a set of sub-ranges, and defines for each sub-range whether it belongs to Range1, Range2 or both, as follows:
  • the hash table has the following form:
  • processor 32 first accesses the hash table of Table 3 using an 8-bit key, which is generated using a template that retains only the eight most significant bits of the address.
  • the first three entries of the table relate to this key. According to the first entry, any address of the form 102.X.X.X falls in R1. According to the second entry, any address of the form 103.X.X.X falls in R1.
  • the third entry of Table 3 returns an inconclusive result.
  • some addresses of the form 104.X.X.X fall in R1, while other addresses of the form 104.X.X.X fall outside R1.
  • the third entry of Table 3 instructs processor 32 to access the hash table again using an updated key.
  • the entry also specifies an updated template for generating the updated key.
  • the updated template retains the sixteen most significant bits of the address.
  • processor 32 When the initial access to the hash table hits the third entry (i.e., when the address begins is of the form 104.X.X.X), processor 32 generates an updated 16-bit key using the updated template specified in the third entry, and accesses the hash table again with the updated key.
  • the second access is directed to the fourth through ninth entries of the hash table of Table 3.
  • the hash table returns a conclusive result that the address falls inside R1.
  • the address is checked against three sub-ranges, two of which indicate that the address falls in R1, and one indicates that the address falls both in R1 and in R2.
  • processor 32 reaches a conclusive range matching result after a maximum of two accesses to the hash table. This maximum is a design choice.
  • the hash table can be designed to have a smaller number of entries, at the expense of a larger probability for multiple accesses, or vice versa.
  • the example above illustrates the technique of a hash-table entry that specifies an updated template for modifying the key before accessing the hash table again.
  • the initial template retains a certain number of most-significant bits of the key
  • the updated template retains a larger number of most-significant bits.
  • the templates may retain any other suitable subsets of bits.
  • a template may even retain all the bits of the address, thereby restricting the match to a range having a single address value. The latter template requires more memory but in return improves performance.
  • the hash table can be designed to allow a larger number of accesses, usually achieving a smaller table.
  • the definition specifies relative priorities among the ranges. For a given IP address, the range matching process should return the highest-priority range in which the address falls, or alternatively return all the ranges in which the address falls in ascending order or priority.
  • processor 32 constructs hash table 44 so as to account for the specified priorities. When using this technique, the relative priorities are handled at the pre-processing phase, and do not require additional computational effort at run-time.
  • FIG. 2 is a flow chart that schematically illustrates a method for IP address range matching, carried out by processor 32 of system 20 , in accordance with an embodiment that is described herein.
  • the method begins with processor 32 receiving a definition of ranges of IP addresses, at a range input step 50 .
  • Pre-processing unit 38 of processor 32 pre-processes the ranges so as to construct hash table 44 , at a pre-processing step 54 .
  • Range matching unit 40 defines an initial hash key template (e.g., mask), at a template initialization step 58 . At this stage the system is ready to start the range matching process.
  • initial hash key template e.g., mask
  • network interface 28 receives a packet from network 24 and forwards the packet to address extraction unit 36 in processor 32 .
  • Extraction unit 36 extracts an IP address (source and/or destination IP address) from the packet.
  • Unit 40 generates a hash key by applying the initial template to the address received at step 62 .
  • Unit 40 then accesses hash table 44 with the resulting hash key, at a hash table querying step 66 .
  • unit 40 checks whether the hash result is negative, i.e., whether the hash key is not mapped to any of the hash-table entries. If so, unit 40 outputs a negative result, at a negative termination step 68 .
  • unit 40 checks whether the hash result is positive, i.e., whether the hash key matches a hash-table entry indicating that the address falls in one or more of the ranges. If so, unit 40 outputs a positive result, typically along with the identity or identities of the range or ranges in which the address falls, at a positive termination step 74 .
  • unit 40 checks whether the hash table entry specifies a sub-range check. If so, unit 40 checks whether the address falls in the sub-range specified in the entry, at a sub-range evaluation step 76 . If the address falls in the sub-range, the match result is positive. If not, the match result is negative.
  • unit 40 obtains an updated key template (which may be different for every key) from the hash-table entry, at a template updating step 86 .
  • the method then loops back to step 66 above, in which unit 40 generates an updated key by applying the updated template to the address, and then accesses the hash table again using the updated key.
  • unit 40 may access the hash table several time, each time using a different template, until reaching a conclusive range matching result.
  • an entry of hash table 44 specifies multiple address sub-ranges with respective range matching results.
  • an address of the form 104.X.X.X will match the third hash-table entry.
  • This entry specifies three sub-ranges: If the address is between 104.160.0.0 and 104.165.12.255, the range matching result is that the address falls in R1. If the address is between 104.165.13.0 and 104.165.13.255, the result is that the address falls in both R1 and R2. If the address is between 104.165.14.0 and 104.175.255.255, the result is that the address falls in R1.
  • Table 5 below shows yet another example of a hash table, in accordance with an embodiment.
  • the hash table may comprise more than one entry that matches a give key.
  • Unit 40 typically stops at the first matching hash-table entry. Therefore, by proper ordering of the entries in the hash table at the pre-processing phase, it is possible to set priorities among matches.
  • processor 32 updates hash table 44 in response to a change in the IP address ranges of interest.
  • Processor 32 typically identifies the hash-table entries that are affected by the change, and updates the entries one after the other.
  • the update can thus be performed at run-time (e.g., using a single writing process and atomic operations, and possibly multiple reading processes) without disrupting the system operation.
  • unit 40 may return two range matching results for the same address during updating of the hash table, but this scenario is considered tolerable.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Methods and systems for range matching. The system holds a definition of one or more ranges of Internet Protocol (IP) addresses. The definition may specify any desired number of ranges of any suitable size, and some ranges may overlap one another or be contained in one another. The definition may also specify certain returned values and/or relative priorities for the various ranges. In a pre-processing phase, a hash table that is subsequently queried with addresses to be range-matched. The hash table may be updated at run-time. During operation, the system receives addresses (e.g., extracts addresses from monitored communication traffic) and identifies by querying the hash table, for each address, whether the address falls within any of the ranges.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
This application is a Continuation of application Ser. No. 14/807,808, filed Jul. 23, 2015, granted as U.S. Pat. No. 10,630,588, on Apr. 21, 2020, which claims priority to Israel Patent Application No. 233776, filed Jul. 24, 2014, which applications are hereby incorporated by this reference in their entireties as if fully set forth herein.
FIELD OF THE DISCLOSURE
The present disclosure relates generally to communication analysis, and particularly to methods and systems for IP address range matching.
BACKGROUND OF THE DISCLOSURE
In various applications it is necessary to find whether a given value is within a specified range or not. This computational problem is commonly known as “range matching” or “range querying.” Range matching is useful, for example, in communication packet analysis, packet routing, firewalls, Intrusion Detection Systems (IDS) and many other applications. Various range matching techniques are known in the art. For example, Zheng et al. describes techniques for finding all the keys in a certain range over an underlying Peer-to-Peer (P2P) network, in “Distributed Segment Tree: Support of Range Query and Cover Query over DHT,” Electronic publications of the 5th International Workshop on Peer-to-Peer Systems (IPTPS'06), 2006, which is incorporated herein by reference.
U.S. Pat. No. 7,394,809, whose disclosure is incorporated herein by reference, describes a packet classifier having a forest of hash tables. The forest of hash tables includes a number of hash tables, each hash table having a bit mask corresponding to an equivalent set of rules. Each hash table includes a number of entries, wherein an entry of a hash table may correspond to a rule. One or more of the hash tables may include a marker in one entry, wherein the marker identifies another one of the hash tables. The hash table identified by the marker is a descendant of the hash table in which the marker is placed.
SUMMARY OF THE DISCLOSURE
An embodiment that is described herein provides a method including pre-processing a definition of one or more ranges of addresses, so as to generate a hash table that is queried by a key produced by applying a template to an address, wherein the hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the hash table again. A first key is produced by applying a first template to an input address, and querying the hash table with the first key. Depending on the result, either the result is output, or the hash table is queried again in accordance with the updated template specified in an entry of the hash table corresponding to the first key.
In some embodiments, querying the hash table again includes, if the result given in the entry corresponding to the first key is inconclusive, applying the updated template specified in the entry to the input address to produce a second key, and querying the hash table again with the second key. In an embodiment the method includes concluding that the input address does not fall in any of the ranges, if the first key does not match any of the entries in the hash table.
In an embodiment, the first template specifies a first subset of bits of the input address to be included in the first key, and the second template specifies a second subset of the bits of the input address, different from the first subset, to be included in the second key. In another embodiment, at least one entry of the hash table specifies a logical condition that, when applied to the input address, produces a conclusive result of whether the input address falls within one or more of the ranges. In an example embodiment, the logical condition specifies one or more sub-ranges for checking against the address.
In yet another embodiment, at least one entry of the hash table specifies multiple address sub-ranges that correspond to multiple respective conclusive results. In an embodiment, the conclusive result further indicates at least one of the ranges in which the address falls. In still another embodiment, the ranges are assigned respective priorities, and pre-processing the definition comprises defining the hash table so as to return range-matching results in accordance with the priorities. In an embodiment, the method includes updating the entries to reflect a change in the ranges, without interrupting access to the entries.
There is additionally provided, in accordance with an embodiment that is described herein, an apparatus including a memory and a processor. The memory is configured to hold, for a definition of one or more ranges of addresses, a hash table that is queried by a key produced by applying a template to an address, wherein the hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the hash table again. The processor is configured to pre-process the definition so as to generate the hash table, to produce a first key by applying a first template to an input address, to query the hash table with the first key, and, depending on the result, to either output the result or to query the hash table again in accordance with the updated template specified in an entry of the hash table corresponding to the first key.
There is also provided, in accordance with an embodiment that is described herein, a computer software product, the product including a tangible non-transitory computer-readable medium in which program instructions are stored, which instructions, when read by a processor, cause the processor to pre-process a definition of one or more ranges of addresses so as to generate a hash table that is queried by a key produced by applying a template to an address, wherein the hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the hash table again, to produce a first key by applying a first template to an input address, and querying the hash table with the first key, and, depending on the result, to either output the result or to query the hash table again in accordance with the updated template specified in an entry of the hash table corresponding to the first key.
The present disclosure will be more fully understood from the following detailed description of the embodiments thereof, taken together with the drawings in which:
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram that schematically illustrates a communication analytics system, in accordance with an embodiment that is described herein; and
FIG. 2 is a flow chart that schematically illustrates a method for IP address range matching, in accordance with an embodiment that is described herein.
DETAILED DESCRIPTION OF EMBODIMENTS Overview
Embodiments that are described herein provide improved methods and systems for range matching. The embodiments described herein refer mainly to range matching of addresses, e.g., Internet Protocol (IP) addresses, in a communication analytics system. The disclosed techniques, however, are not limited to this particular application, and may be used for range matching of any other suitable numerical values.
In some embodiments, the system holds a definition of one or more ranges of IP addresses. The definition may specify any desired number of ranges of any suitable size, and some ranges may overlap one another or be contained in one another. The definition may also specify certain returned values and/or relative priorities for the various ranges. In some embodiments, the system carries out a pre-processing phase, which derives from the definition a hash table that is subsequently queried with addresses to be range-matched. The hash table may be updated at run-time, e.g., in response to changes in the range definition.
During operation, the system receives addresses (e.g., extracts addresses from monitored communication traffic) and identifies by querying the hash table, for each address, whether the address falls within any of the ranges. If so, the system typically also identifies which of the ranges contains the address. This process is referred to herein as “range matching.” The hash table constructed during the pre-processing phase also accounts for the specified priorities among ranges, without requiring additional effort at run-time.
The hash table is designed to be accessed with a key that is produced by applying a template to the address to be range-matched. In one embodiment, the template comprises a mask that defines a subset of the bits of the address.
In the disclosed embodiments, a given entry of the hash table may provide a conclusive or inconclusive result. A conclusive result may comprise either a positive match indicating the range or ranges containing the address, or a negative match indicating that the address does not fall within any of the ranges. An inconclusive result indicates that it is not possible to decide on a positive or negative match using the currently-used key. In some embodiments, an entry that returns an inconclusive result also specifies an updated template (e.g., mask) that should be applied to the address before accessing the hash table again.
In a typical flow, the system applies an initial template to the address, and accesses the hash table with the resulting key. If the hash-table entry corresponding to the key indicates a conclusive result, the system outputs or acts upon the result, and the process terminates. If the hash-table entry indicates an inconclusive result, the system extracts an updated template from the hash-table entry, generates an updated key by applying the updated template to the address, and accesses the hash table again using the updated key.
The process above may be repeated several times: In some scenarios the system may need to access the hash table multiple times until achieving a conclusive (positive or negative) match. Each access of the hash table uses a different template (and therefore a different key), as specified in the previously-visited hash-table entry. In some embodiments, an entry that returns an inconclusive result specifies a logical condition instead of an updated template. The logical condition may specify, for example, a positive match if the IP address falls in some specified sub-range, and a negative match otherwise. Applying the logical condition to the address thus yields a conclusive match.
In designing the disclosed hash table structures, it is possible to trade memory size against computational complexity and matching speed. For a given set of address ranges, if the hash table is designed with a large number of entries (i.e., large memory space), the average number of repeated accesses to the table is reduced (i.e., high range-matching speed). The extreme case would be to generate hash-table entries per each value in the range-A design that would require extremely large memory but incur no repeated accesses. This sort of solution is not feasible in most cases, since memory resources are limited. For example, to meet throughput and latency goals, it is advantageous for the hash table to fit into a small processor cache memory. At the other extreme, when the number of entries is small (i.e., small memory space), the average number of repeated accesses to the table is increased (i.e., reduced range-matching speed). Intermediate designs are similarly applicable.
The disclosed range matching techniques enable straightforward tuning of performance to match desired speed and memory space requirements, and also lend themselves to smooth and seamless reconfiguration of the hash table.
System Description
FIG. 1 is a block diagram that schematically illustrates a communication analytics system 20, in accordance with an embodiment that is described herein. System 20 monitors and analyzes communication packets that are exchanged over a communication network 24, such as the Internet.
As part of the analysis process, system 20 extracts Internet Protocol (IP) addresses from the monitored packets, and performs a range matching process on the IP addresses. The system may then decide how to handle the packets depending on the range matching results. For example, system 20 may hold a definition of ranges of IP addresses that are of interest, and analyze only packets whose IP addresses fall inside one of the ranges of interest. In alternative embodiments, the disclosed range matching techniques can be used in routers or other network elements that route the packets depending on the range-matching results.
In the present example, system 20 comprises a network interface 28 for monitoring packets exchanged over network 24, and a processor 32 that is configured to carry out the range matching processes described herein. Processor 32 comprises a pre-processing unit 38 that performs the pre-processing phase described above, an address extraction unit 36 that extracts IP addresses from monitored packets at run-time, and a range matching unit 40 that applies range matching to the extracted addresses.
Unit 40 produces match results that are used by system 20 for subsequent processing, e.g., to decide which packets to discard and which to analyze. Processor further comprises a memory 44 that stores a hash table. Memory 44 may comprise any suitable memory type. Typically, the hash table is kept sufficiently small to fit in the Random Access Memory (RAM) cache memory of processor 32. In the description that follows, the hash table and the memory holding the hash table are referred to interchangeably as “memory 44” or “hash table 44,” for the sake of brevity. Hash table 44 has a unique structure that enables rapid and efficient range matching, as will be described in detail below.
The configurations of system 20 shown in FIG. 1 is as example configuration that is chosen purely for the sake of conceptual clarity. In alternative embodiments, any other suitable system configuration can be used. For example, the embodiments described herein refer mainly to IP addresses, and are applicable, for example, in IPv4 or IPv6 networks. The disclosed techniques, however, are not limited to range matching of IP addresses, and can be used for range matching of other types of addresses. Moreover, the disclosed techniques can generally be used for range matching of any other suitable numerical values (e.g., packet lengths or port numbers), either instead of or in addition to address range matching. When range matching is performed in multiple dimensions (e.g., both IP address and port number), the system would typically carry out the process one dimension at a time.
Certain elements of system 20 can be implemented using hardware, such as using one or more Application-Specific Integrated Circuits (ASICs) or Field-Programmable Gate Arrays (FPGAs) or other device types. Additionally or alternatively, certain elements of system 20 can be implemented using software, or using a combination of hardware and software elements.
Typically, processor 32 comprises a general-purpose computer, which is programmed in software to carry out the functions described herein. The software may be downloaded to the computer in electronic form, over a network, for example, or it may, alternatively or additionally, be provided and/or stored on non-transitory tangible media, such as magnetic, optical, or electronic memory.
Range Matching Using Hash Table Lookup
In some embodiments, processor 32 receives and stores a definition of one or more ranges of IP address of interest. Unit 38 pre-processes this definition so as to produce hash table 44. The definition may specify any number of ranges, and each range may be of any suitable size. Ranges may be disjoint, overlapping or contained in one another, as desired. The ranges may be assigned respective relative priorities.
In the description that follows, each range is represented using the notation X1.X2.X3.X4/N, wherein X1.X2.X3.X4 denotes a 32-bit IP address (X1 . . . X4 are integer numbers between 0 and 255), and N denotes the number of Most Significant Bits (MSBs) that span the range. For example, 56.176.23.0/20 specifies a range of 2(32−20)=212 IP addresses starting from 56.176.23.0. As another example, 56.176.23.14/32 denotes a range that includes the single address 56.176.23.14. Alternatively, however, the disclosed techniques can be used with any other suitable notation.
In one example, the definition may comprise the following three ranges:
  • Range A: [69.63.176.0/20, 69.63.176.0/20, 204.15.20.0/22]
  • Range B: [102.0.0.0/7, 104.0.0.0/8, 106.0.0.0/8, 179.0.0.0/8, 185.0.0.0/8]
  • Range C: [184.82.162.163/32, 184.22.103.202/32, 158.255.211.28/32]
For the above definition, the range matching process may return one of two possible results: Either the address falls in the range (together with the identities of the range(s) in which the address falls); or the address does not fall in the range.
In some embodiments, processor 32 carries out a pre-processing phase that translates the range definition into hash table 44. The processor later checks whether a given address falls in one or more of the ranges by querying the hash table.
Hash table 44 is designed to be accessed by a key, which is generated by applying a template to the address. In the embodiments described herein, the template comprises a bit mask, and the processor generates the key by calculating a bit-wise AND between the bit mask and the address. Generally, however, any other suitable template can be used. One example is a “DEV” operator used with non-binary numbers.
Consider, for example, the range definition R1=[102.0.0.0/7, 104.160.0.0/12, 106.0.0.0/8, 179.1.2.0/24]. In an embodiment, processor 32 translates this range definition into the following hash table:
TABLE 1
Range size
Key Scenario Result (after scenario)
102 All R1 16M
103 All R1 16M
104 (104.160.0.0-104.175.255.255) R1  1M
106 All R1 16M
179 (179.1.2.0-179.1.2.255)  R1 256
In the example of Table 1, the template comprises an 8-bit mask that selects the eight most-significant bits of the IP address and masks the other bits. In other words, the key for accessing the table comprises the eight most-significant bits of the address. Alternatively, however, any other suitable number of bits can be used, typically depending on the pre-processing phase.
The first entry of Table 1 indicates that all addresses that match the key (i.e., all addresses of the form 102.X.X.X) fall inside range R1. The second entry indicates that all addresses of the form 103.X.X.X also fall inside range R1. Note that this information was implicit in the original range definition, and was added by the processor when constructing the hash table.
The third entry in Table 1 indicates that addresses whose upper sixteen bits are between 104.160 and 104.175 fall in the range R1. In this entry, the “SCENARIO” attribute indicates the partial subset of the addresses matching the key (104) that are handled by this entry. In this example, the hash-table entry specifies a simple sub-range checking. An alternative embodiment, in which a hash-table entry specifies accessing the hash table again with a different key, is described further below.
The fourth entry indicates that all addresses of the form 106.X.X.X fall in range R1. The fifth entry in Table indicates that addresses between 179.1.2.0 and 179.1.2.255 fall in the range R1. Again, the “SCENARIO” attribute indicates the partial subset of the addresses matching the key (179) that are handled by this entry.
Note that most of the possible hash key values (all the values other than 102, 103, 104, 106 and 179) are not specified in the hash table at all. In this embodiment, and in the examples that follow, a key that does not match any entry of the hash table indicates that the corresponding address does not fall in any of the ranges. This convention is highly efficient in terms of memory space.
In some embodiments, in addition to a positive result indicating that the address falls in one of the ranges, the hash table also returns the identity of the range or ranges in which the address falls. Consider, for example, the following definition:
    • Range1=[102.0.0.0/7, 104.160.0.0/12, 106.0.0.0/8, 179.1.2.0/24]
    • Range2=[104.165.13.0/24, 106.0.0.0/16, 108.25.0.0/16]
In an embodiment, processor 32 divides the ranges in the definition into a set of sub-ranges, and defines for each sub-range whether it belongs to Range1, Range2 or both, as follows:
TABLE 2
102.0.0.0/7 Range1
104.160.0.0-104.165.12.255 Range1
104.165.13.0-104.165.13.255  Range1 and Range2
104.165.14.0-104.175.255.255 Range1
 106.0.0.0-106.0.255.255 Range1 and Range2
  106.1.0.0-106.255.255.255 Range1
 108.25.0.0-108.25.255.255 Range2
In another embodiment, the hash table has the following form:
TABLE 3
Range size
Key Scenario Result (after scenario)
102 All R1  16M
103 All R1  16M
104 104.X Access hash   1M
table again.
Updated
template is
upper 16 bits
104.160 All R1 65K
104.161 All R1 65K
104.162 All R1 65K
104.163 All R1 65K
104.164 All R1 65K
104.165 (104.165.0.0-104.165.12.255) R1 3328
104.165.13.0-104.165.13.255  R1 + R2 256
104.165.14.0-104.165.255.255 R1 61696
104.166 All R1 65K
In the present example, processor 32 first accesses the hash table of Table 3 using an 8-bit key, which is generated using a template that retains only the eight most significant bits of the address. The first three entries of the table relate to this key. According to the first entry, any address of the form 102.X.X.X falls in R1. According to the second entry, any address of the form 103.X.X.X falls in R1.
The third entry of Table 3 returns an inconclusive result. In the present range definition, some addresses of the form 104.X.X.X fall in R1, while other addresses of the form 104.X.X.X fall outside R1. In other words, it is impossible to make a conclusive range matching decision based on the initial 8-bit key.
In this embodiment, the third entry of Table 3 instructs processor 32 to access the hash table again using an updated key. The entry also specifies an updated template for generating the updated key. In the present example, the updated template retains the sixteen most significant bits of the address.
When the initial access to the hash table hits the third entry (i.e., when the address begins is of the form 104.X.X.X), processor 32 generates an updated 16-bit key using the updated template specified in the third entry, and accesses the hash table again with the updated key. The second access is directed to the fourth through ninth entries of the hash table of Table 3.
According to the fourth through eighth entries, if the address is of the form 104.160.X.X, 104.161.X.X, 104.162.X.X, 104.163.X.X or 104.164.X.X, the hash table returns a conclusive result that the address falls inside R1. According to the ninth entry of Table 3, the address is checked against three sub-ranges, two of which indicate that the address falls in R1, and one indicates that the address falls both in R1 and in R2.
In the example above, processor 32 reaches a conclusive range matching result after a maximum of two accesses to the hash table. This maximum is a design choice. The hash table can be designed to have a smaller number of entries, at the expense of a larger probability for multiple accesses, or vice versa.
The example above illustrates the technique of a hash-table entry that specifies an updated template for modifying the key before accessing the hash table again. In the above example, the initial template retains a certain number of most-significant bits of the key, and the updated template retains a larger number of most-significant bits. In alternative embodiments, however, the templates may retain any other suitable subsets of bits. A template may even retain all the bits of the address, thereby restricting the match to a range having a single address value. The latter template requires more memory but in return improves performance.
In the above example, a conclusive result is obtained after a maximum of two accesses of the hash table. In alternative embodiments, the hash table can be designed to allow a larger number of accesses, usually achieving a smaller table.
In some embodiments, the definition specifies relative priorities among the ranges. For a given IP address, the range matching process should return the highest-priority range in which the address falls, or alternatively return all the ranges in which the address falls in ascending order or priority. In these embodiments, processor 32 constructs hash table 44 so as to account for the specified priorities. When using this technique, the relative priorities are handled at the pre-processing phase, and do not require additional computational effort at run-time.
FIG. 2 is a flow chart that schematically illustrates a method for IP address range matching, carried out by processor 32 of system 20, in accordance with an embodiment that is described herein. The method begins with processor 32 receiving a definition of ranges of IP addresses, at a range input step 50. Pre-processing unit 38 of processor 32 pre-processes the ranges so as to construct hash table 44, at a pre-processing step 54. Range matching unit 40 defines an initial hash key template (e.g., mask), at a template initialization step 58. At this stage the system is ready to start the range matching process.
At a traffic input step 62, network interface 28 receives a packet from network 24 and forwards the packet to address extraction unit 36 in processor 32. Extraction unit 36 extracts an IP address (source and/or destination IP address) from the packet.
Unit 40 generates a hash key by applying the initial template to the address received at step 62. Unit 40 then accesses hash table 44 with the resulting hash key, at a hash table querying step 66.
At a negative checking step 67, unit 40 checks whether the hash result is negative, i.e., whether the hash key is not mapped to any of the hash-table entries. If so, unit 40 outputs a negative result, at a negative termination step 68.
Otherwise, at a positive checking step 70, unit 40 checks whether the hash result is positive, i.e., whether the hash key matches a hash-table entry indicating that the address falls in one or more of the ranges. If so, unit 40 outputs a positive result, typically along with the identity or identities of the range or ranges in which the address falls, at a positive termination step 74.
Otherwise, at a sub-range checking step 75, unit 40 checks whether the hash table entry specifies a sub-range check. If so, unit 40 checks whether the address falls in the sub-range specified in the entry, at a sub-range evaluation step 76. If the address falls in the sub-range, the match result is positive. If not, the match result is negative.
Both a positive result and a negative result are considered conclusive results, after which the range matching process terminates. If steps 67, 70 and 75 do not yield a conclusive result, then the hash key matches a hash-table entry that indicates an inconclusive result.
In this case, unit 40 obtains an updated key template (which may be different for every key) from the hash-table entry, at a template updating step 86. The method then loops back to step 66 above, in which unit 40 generates an updated key by applying the updated template to the address, and then accesses the hash table again using the updated key. As explained above, unit 40 may access the hash table several time, each time using a different template, until reaching a conclusive range matching result.
In some embodiments, an entry of hash table 44 specifies multiple address sub-ranges with respective range matching results. Consider, for example, Table 4 below:
TABLE 4
Range
Key Scenario Result size
102 All R1 16M
103 All R1 16M
104 (104.160.0.0-104.165.12.255) ⇒ R1  1M
R1
(104.165.13.0-104.165.13.255) ⇒ R1 + R2
R1 + R2
(104.165.14.0-104.175.255.255) ⇒ R1
R1
In this example, an address of the form 104.X.X.X will match the third hash-table entry. This entry specifies three sub-ranges: If the address is between 104.160.0.0 and 104.165.12.255, the range matching result is that the address falls in R1. If the address is between 104.165.13.0 and 104.165.13.255, the result is that the address falls in both R1 and R2. If the address is between 104.165.14.0 and 104.175.255.255, the result is that the address falls in R1.
Note that the union of these sub-ranges does not cover all the addresses of the form 104.X.X.X. Therefore, some addresses that match the third hash-table entry will not match any of the three sub-ranges. Such addresses will return a negative result, i.e., they do not fall in any of the ranges. At the pre-processing phase it is possible to define the hash table with entries specifying sub-range checks and entries specifying re-access with different templates, in any desired order.
Table 5 below shows yet another example of a hash table, in accordance with an embodiment.
TABLE 5
Range
Key Scenario Result size
102 All R1  16M
103 All R1  16M
104 104.X Access hash table   1M
again. Updated
template is upper 16 bits
104.160 All R1 65K
104.161 All R1 65K
104.162 All R1 65K
104.163 All R1 65K
104.164 All R1 65K
104.165 104.165.X R1 65K
In some embodiments, the hash table may comprise more than one entry that matches a give key. Unit 40 typically stops at the first matching hash-table entry. Therefore, by proper ordering of the entries in the hash table at the pre-processing phase, it is possible to set priorities among matches.
In some embodiments, processor 32 updates hash table 44 in response to a change in the IP address ranges of interest. Processor 32 typically identifies the hash-table entries that are affected by the change, and updates the entries one after the other. Typically, there is no need to lock the access to the hash table during the update. The update can thus be performed at run-time (e.g., using a single writing process and atomic operations, and possibly multiple reading processes) without disrupting the system operation. In rare occasions, unit 40 may return two range matching results for the same address during updating of the hash table, but this scenario is considered tolerable.
Although the embodiments described herein mainly address range matching in communication analytics applications, the principles of the present disclosure are not limited to communication analytics, can also be used for range matching in other fields.
It will thus be appreciated that the embodiments described above are cited by way of example, and that the present disclosure is not limited to what has been particularly shown and described hereinabove. Rather, the scope of the present disclosure includes both combinations and sub-combinations of the various features described hereinabove, as well as variations and modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not disclosed in the prior art. Documents incorporated by reference in the present patent application are to be considered an integral part of the application except that to the extent any terms are defined in these incorporated documents in a manner that conflicts with the definitions made explicitly or implicitly in the present specification, only the definitions in the present specification should be considered.

Claims (21)

The invention claimed is:
1. A method, comprising:
pre-processing a definition of one or more ranges of addresses of interest, so as to
determine a number of bits of a first template comprising a mask that selects the number of most significant bits of an address and masks the other bits; and
generate a single hash table that is queried by a first key produced by applying the first template to an address, wherein the single hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the single hash table again;
producing the first key by applying the first template to an input address, and querying the single hash table with the first key; and
depending on the result, either outputting the result or querying the single hash table again in accordance with the updated template specified in an entry of the single hash table corresponding to the first key, wherein the updated template includes more significant bits of the input address than the first template.
2. The method according to claim 1, wherein querying the single hash table again comprises, if the result given in the entry corresponding to the first key is inconclusive, applying the updated template specified in the entry to the input address to produce a second key, and querying the single hash table again with the second key.
3. The method according to claim 1, wherein if the first key does not match any of the entries in the single hash table, concluding that the input address does not fall in any of the ranges.
4. The method according to claim 1, wherein the first template specifies a first subset of bits of the input address to be included in the first key, and wherein a second template specifies a second subset of the bits of the input address, different from the first subset, to be included in the second key.
5. The method according to claim 1, wherein at least one entry of the single hash table specifies a logical condition that, when applied to the input address, produces a conclusive result of whether the input address falls within one or more of the ranges.
6. The method according to claim 5, wherein the logical condition specifies one or more sub-ranges for checking against the address.
7. The method according to claim 1, wherein at least one entry of the single hash table specifies multiple address sub-ranges that correspond to multiple respective conclusive results.
8. The method according to claim 1, wherein the conclusive result further indicates at least one of the ranges in which the address falls.
9. The method according to claim 1, wherein the ranges are assigned respective priorities, and wherein pre-processing the definition comprises defining the single hash table so as to return range-matching results in accordance with the priorities.
10. The method according to claim 1, and comprising updating the entries to reflect a change in the ranges, without interrupting access to the entries.
11. An apparatus, comprising:
a memory, which is configured to hold, for a definition of one or more ranges of addresses of interest, a single hash table that is queried by a first key produced by applying a first template, comprising a mask that selects a number of most-significant bits of an address and masks the other bits, to an address, wherein the single hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the single hash table again; and
a processor, which is configured to pre-process the definition so as to
determine the number of most-significant bits of the mask;
generate the single hash table, to produce a first key by applying the first template to an input address, to query the single hash table with the first key, and, depending on the result, to either output the result or to query the single hash table again in accordance with the updated template specified in an entry of the single hash table corresponding to the first key, wherein the updated template includes more of significant bits of the input address than the first template.
12. The apparatus according to claim 11, wherein, if the result given in the entry corresponding to the first key is inconclusive, the processor is configured to apply the updated template specified in the entry to the input address to produce a second key, and to query the single hash table again with the second key.
13. The apparatus according to claim 11, wherein the processor is configured to conclude that the input address does not fall in any of the ranges if the first key does not match any of the entries in the single hash table.
14. The apparatus according to claim 11, wherein the first template specifies a first subset of bits of the input address to be included in the first key, and wherein a second template specifies a second subset of the bits of the input address, different from the first subset, to be included in the second key.
15. The apparatus according to claim 11, wherein at least one entry of the single hash table specifies a logical condition that, when applied to the input address, produces a conclusive result of whether the input address falls within one or more of the ranges.
16. The apparatus according to claim 15, wherein the logical condition specifies one or more sub-ranges for checking against the address.
17. The apparatus according to claim 11, wherein at least one entry of the single hash table specifies multiple address sub-ranges that correspond to multiple respective conclusive results.
18. The apparatus according to claim 11, wherein the conclusive result further indicates at least one of the ranges in which the address falls.
19. The apparatus according to claim 11, wherein the ranges are assigned respective priorities, and wherein the processor is configured to define the single hash table so as to return range-matching results in accordance with the priorities.
20. The apparatus according to claim 11, wherein the processor is configured to update the entries to reflect a change in the ranges, without interrupting access to the entries.
21. A computer software product, the product comprising a tangible non-transitory computer-readable medium in which program instructions are stored, which instructions, when read by a processor, cause the processor to pre-process a definition of one or more ranges of addresses of interest so as to determine a number of bits of a first template, comprising a mask that selects the number of most significant bits of an address and masks the other bits, and generate a single hash table that is queried by a first key produced by applying the first template to an address, wherein the single hash table comprises multiple entries, such that a given entry specifies either a conclusive result of whether the address falls within one or more of the ranges, or an inconclusive result with an updated template for applying to the address before querying the single hash table again, to produce a first key by applying the first template to an input address, and querying the single hash table with the first key, and, depending on the result, to either output the result or to query the single hash table again in accordance with the updated template specified in an entry of the single hash table corresponding to the first key, wherein the updated template includes more of the significant bits of the input address than the template.
US16/853,312 2014-07-24 2020-04-20 System and method for range matching Active US11463360B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/853,312 US11463360B2 (en) 2014-07-24 2020-04-20 System and method for range matching

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IL233776 2014-07-24
IL233776A IL233776B (en) 2014-07-24 2014-07-24 System and method for range matching
US14/807,808 US10630588B2 (en) 2014-07-24 2015-07-23 System and method for range matching
US16/853,312 US11463360B2 (en) 2014-07-24 2020-04-20 System and method for range matching

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/807,808 Continuation US10630588B2 (en) 2014-07-24 2015-07-23 System and method for range matching

Publications (2)

Publication Number Publication Date
US20200296041A1 US20200296041A1 (en) 2020-09-17
US11463360B2 true US11463360B2 (en) 2022-10-04

Family

ID=55167603

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/807,808 Active 2036-02-23 US10630588B2 (en) 2014-07-24 2015-07-23 System and method for range matching
US16/853,312 Active US11463360B2 (en) 2014-07-24 2020-04-20 System and method for range matching

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/807,808 Active 2036-02-23 US10630588B2 (en) 2014-07-24 2015-07-23 System and method for range matching

Country Status (2)

Country Link
US (2) US10630588B2 (en)
IL (1) IL233776B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10116564B2 (en) 2014-11-10 2018-10-30 Cavium, Inc. Hybrid wildcard match table
US11218410B2 (en) * 2014-11-10 2022-01-04 Marvell Asia Pte, Ltd. Hybrid wildcard match table
US11943142B2 (en) 2014-11-10 2024-03-26 Marvell Asia Pte, LTD Hybrid wildcard match table
KR20170133750A (en) * 2016-05-26 2017-12-06 삼성전자주식회사 Computer-implemented method for designing integrated circuit
US10686598B2 (en) 2017-02-27 2020-06-16 Cord3 Innovation Inc. One-to-many symmetric cryptographic system and method
US11606263B2 (en) * 2017-10-17 2023-03-14 Science Applications International Corporation Large network simulation

Citations (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5689442A (en) 1995-03-22 1997-11-18 Witness Systems, Inc. Event surveillance system
US6279113B1 (en) 1998-03-16 2001-08-21 Internet Tools, Inc. Dynamic signature inspection-based network intrusion detection
US6404857B1 (en) 1996-09-26 2002-06-11 Eyretel Limited Signal monitoring apparatus for analyzing communications
US20020118682A1 (en) * 2000-12-22 2002-08-29 Myongsu Choe Apparatus and method for performing high-speed IP route lookup and managing routing/forwarding tables
US20020129140A1 (en) 2001-03-12 2002-09-12 Ariel Peled System and method for monitoring unauthorized transport of digital content
US6564211B1 (en) 2000-10-04 2003-05-13 Lsi Logic Corporation Fast flexible search engine for longest prefix match
US20030097439A1 (en) 2000-10-23 2003-05-22 Strayer William Timothy Systems and methods for identifying anomalies in network data streams
US6718023B1 (en) 1999-07-12 2004-04-06 Ectel Ltd. Method and system for creating real time integrated Call Details Record (CDR) databases in management systems of telecommunication networks
US6741992B1 (en) 1999-07-29 2004-05-25 Xtenit Flexible rule-based communication system and method for controlling the flow of and access to information between computer users
US6813273B2 (en) 2001-01-19 2004-11-02 Motorola, Inc. Method and apparatus for determining existence of an address in an address look-up table
US20040230696A1 (en) * 2003-05-15 2004-11-18 Barach David Richard Bounded index extensible hash-based IPv6 address lookup method
US20040255045A1 (en) * 2003-05-26 2004-12-16 Hyesook Lim IP address lookup method and hardware architecture using hashing
US20050018618A1 (en) 2003-07-25 2005-01-27 Mualem Hezi I. System and method for threat detection and response
US20050198468A1 (en) 2004-01-30 2005-09-08 Ati Technologies, Inc. Method and apparatus for superword register value numbering
US7134141B2 (en) 2000-06-12 2006-11-07 Hewlett-Packard Development Company, L.P. System and method for host and network based intrusion detection and response
US7216162B2 (en) 2000-05-24 2007-05-08 Verint Systems Ltd. Method of surveilling internet communication
US7225343B1 (en) 2002-01-25 2007-05-29 The Trustees Of Columbia University In The City Of New York System and methods for adaptive model generation for detecting intrusions in computer systems
US20070180509A1 (en) 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20070186284A1 (en) 2004-08-12 2007-08-09 Verizon Corporate Services Group Inc. Geographical Threat Response Prioritization Mapping System And Methods Of Use
US20070192863A1 (en) 2005-07-01 2007-08-16 Harsh Kapoor Systems and methods for processing data flows
US7287278B2 (en) 2003-08-29 2007-10-23 Trend Micro, Inc. Innoculation of computing devices against a selected computer virus
US20070294768A1 (en) 2006-01-31 2007-12-20 Deutsche Telekom Ag Method and system for detecting malicious behavioral patterns in a computer, using machine learning
US20080014873A1 (en) 2006-07-12 2008-01-17 Krayer Yvonne L Methods and apparatus for adaptive local oscillator nulling
US20080028463A1 (en) 2005-10-27 2008-01-31 Damballa, Inc. Method and system for detecting and responding to attacking networks
US20080112413A1 (en) * 2006-11-10 2008-05-15 Fong Pong Method and system for hash table based routing via table and prefix aggregation
US20080141376A1 (en) 2006-10-24 2008-06-12 Pc Tools Technology Pty Ltd. Determining maliciousness of software
US20080184371A1 (en) 2007-01-29 2008-07-31 Deutsche Telekom Ag method and system for detecting malicious behavioral patterns in a computer, using machine learning
US20080196104A1 (en) 2007-02-09 2008-08-14 George Tuvell Off-line mms malware scanning system and method
US20080261192A1 (en) 2006-12-15 2008-10-23 Atellis, Inc. Synchronous multi-media recording and playback with end user control of time, data, and event visualization for playback control over a network
US20080285464A1 (en) 2007-05-17 2008-11-20 Verint Systems, Ltd. Network identity clustering
US7466816B2 (en) 2000-01-13 2008-12-16 Verint Americas Inc. System and method for analysing communication streams
US20090106842A1 (en) 2007-10-19 2009-04-23 Durie Anthony Robert System for Regulating Host Security Configuration
US20090150999A1 (en) 2007-12-05 2009-06-11 International Business Machines Corporation System, method and program product for detecting computer attacks
US20090158430A1 (en) 2005-10-21 2009-06-18 Borders Kevin R Method, system and computer program product for detecting at least one of security threats and undesirable computer files
US20090216760A1 (en) 2007-08-29 2009-08-27 Bennett James D Search engine with webpage rating feedback based internet search operation
US7587041B2 (en) 2000-01-13 2009-09-08 Verint Americas Inc. System and method for analysing communications streams
US20090249484A1 (en) 2008-03-26 2009-10-01 Fraser Howard Method and system for detecting restricted content associated with retrieved content
US20090282476A1 (en) 2006-12-29 2009-11-12 Symantec Corporation Hygiene-Based Computer Security
US20100023726A1 (en) 2008-07-28 2010-01-28 Aviles Joaquin J Dual Hash Indexing System and Methodology
US20100037314A1 (en) 2008-08-11 2010-02-11 Perdisci Roberto Method and system for detecting malicious and/or botnet-related domain names
US20100071065A1 (en) 2008-09-18 2010-03-18 Alcatel Lucent Infiltration of malware communications
US20100100949A1 (en) 2007-07-06 2010-04-22 Abhilash Vijay Sonwane Identity and policy-based network security and management system and method
US20100284405A1 (en) 2009-05-07 2010-11-11 Ewha University Industry Collaboration Foundation Method and apparatus for searching ip address
US20110099620A1 (en) 2009-04-09 2011-04-28 Angelos Stavrou Malware Detector
US20110154497A1 (en) 2009-12-17 2011-06-23 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110167494A1 (en) 2009-12-31 2011-07-07 Bowen Brian M Methods, systems, and media for detecting covert malware
US20110271341A1 (en) 2010-04-28 2011-11-03 Symantec Corporation Behavioral signature generation using clustering
US20110302653A1 (en) 2010-03-01 2011-12-08 Silver Tail Systems, Inc. System and Method for Network Security Including Detection of Attacks Through Partner Websites
US20110320816A1 (en) 2009-03-13 2011-12-29 Rutgers, The State University Of New Jersey Systems and method for malware detection
USRE43103E1 (en) 2004-08-07 2012-01-10 Rozman Allen F System and method for protecting a computer system from malicious software
US20120017281A1 (en) 2010-07-15 2012-01-19 Stopthehacker.com, Jaal LLC Security level determination of websites
US8111697B1 (en) 2008-12-31 2012-02-07 Juniper Networks, Inc. Methods and apparatus for packet classification based on multiple conditions
US8176527B1 (en) 2002-12-02 2012-05-08 Hewlett-Packard Development Company, L. P. Correlation engine with support for time-based rules
US20120167221A1 (en) 2010-12-22 2012-06-28 Electronics And Telecommunications Research Institute Apparatus for analyzing traffic
US20120174225A1 (en) 2010-12-30 2012-07-05 Verisign, Inc. Systems and Methods for Malware Detection and Scanning
US8224761B1 (en) 2005-09-01 2012-07-17 Raytheon Company System and method for interactive correlation rule design in a network security system
US20120222117A1 (en) 2009-09-02 2012-08-30 Infotect Security Pte Ltd Method and system for preventing transmission of malicious contents
US20120304244A1 (en) 2011-05-24 2012-11-29 Palo Alto Networks, Inc. Malware analysis system
US20120311708A1 (en) 2011-06-01 2012-12-06 Mcafee, Inc. System and method for non-signature based detection of malicious processes
US20130014253A1 (en) 2011-07-06 2013-01-10 Vivian Neou Network Protection Service
US8402543B1 (en) 2011-03-25 2013-03-19 Narus, Inc. Machine learning based botnet detection with dynamic adaptation
US8413244B1 (en) 2010-11-11 2013-04-02 Symantec Corporation Using temporal attributes to detect malware
US8499348B1 (en) 2010-12-28 2013-07-30 Amazon Technologies, Inc. Detection of and responses to network attacks
US20130246651A1 (en) * 2012-03-13 2013-09-19 Juniper Networks, Inc. Longest prefix match searches with variable numbers of prefixes
US8578493B1 (en) 2011-05-10 2013-11-05 Narus, Inc. Botnet beacon detection
US20130333038A1 (en) 2005-09-06 2013-12-12 Daniel Chien Evaluating a questionable network communication
US20130343388A1 (en) 2012-06-21 2013-12-26 Jonathan Stroud Binding of network flows to process threads
US8630294B1 (en) * 2011-05-11 2014-01-14 Juniper Networks, Inc. Dynamic bypass mechanism to alleviate bloom filter bank contention
US20140075557A1 (en) 2012-09-11 2014-03-13 Netflow Logic Corporation Streaming Method and System for Processing Network Metadata
US8682812B1 (en) 2010-12-23 2014-03-25 Narus, Inc. Machine learning based botnet detection using real-time extracted traffic features
US8762948B1 (en) 2012-12-20 2014-06-24 Kaspersky Lab Zao System and method for establishing rules for filtering insignificant events for analysis of software program
US20140207917A1 (en) 2013-01-22 2014-07-24 Netcitadel, Inc. System, apparatus and method for dynamically updating the configuration of a network device
US8839417B1 (en) 2003-11-17 2014-09-16 Mcafee, Inc. Device, system and method for defending a computer network
US8838951B1 (en) 2011-03-07 2014-09-16 Raytheon Company Automated workflow generation
US8850579B1 (en) 2009-11-13 2014-09-30 SNS Soft LLC Application of nested behavioral rules for anti-malware processing
US20140298469A1 (en) 2012-02-21 2014-10-02 Logos Technologies Llc System for detecting, analyzing, and controlling infiltration of computer and network systems
US8869268B1 (en) 2007-10-24 2014-10-21 Symantec Corporation Method and apparatus for disrupting the command and control infrastructure of hostile programs
US20150098470A1 (en) * 2013-10-04 2015-04-09 Broadcom Corporation Hierarchical hashing for longest prefix matching
US20150358290A1 (en) 2014-06-04 2015-12-10 Nicira, Inc. Use of stateless marking to speed up stateful firewall rule processing

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5920886A (en) * 1997-03-14 1999-07-06 Music Semiconductor Corporation Accelerated hierarchical address filtering and translation using binary and ternary CAMs
US7013367B2 (en) * 2002-07-18 2006-03-14 Intel Corporation Caching associative memory using non-overlapping data
US7581059B2 (en) * 2005-07-27 2009-08-25 Netlogic Microsystems, Inc. Controlling a searchable range within a network search engine
US7990976B2 (en) * 2009-05-13 2011-08-02 Telefonaktiebolaget L M Ericsson (Publ) Negotiated secure fast table lookups for protocols with bidirectional identifiers

Patent Citations (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5689442A (en) 1995-03-22 1997-11-18 Witness Systems, Inc. Event surveillance system
US6404857B1 (en) 1996-09-26 2002-06-11 Eyretel Limited Signal monitoring apparatus for analyzing communications
USRE40634E1 (en) 1996-09-26 2009-02-10 Verint Americas Voice interaction analysis module
US6757361B2 (en) 1996-09-26 2004-06-29 Eyretel Limited Signal monitoring apparatus analyzing voice communication content
US6279113B1 (en) 1998-03-16 2001-08-21 Internet Tools, Inc. Dynamic signature inspection-based network intrusion detection
US6718023B1 (en) 1999-07-12 2004-04-06 Ectel Ltd. Method and system for creating real time integrated Call Details Record (CDR) databases in management systems of telecommunication networks
US6741992B1 (en) 1999-07-29 2004-05-25 Xtenit Flexible rule-based communication system and method for controlling the flow of and access to information between computer users
US7466816B2 (en) 2000-01-13 2008-12-16 Verint Americas Inc. System and method for analysing communication streams
US7587041B2 (en) 2000-01-13 2009-09-08 Verint Americas Inc. System and method for analysing communications streams
US7216162B2 (en) 2000-05-24 2007-05-08 Verint Systems Ltd. Method of surveilling internet communication
US7134141B2 (en) 2000-06-12 2006-11-07 Hewlett-Packard Development Company, L.P. System and method for host and network based intrusion detection and response
US6564211B1 (en) 2000-10-04 2003-05-13 Lsi Logic Corporation Fast flexible search engine for longest prefix match
US20030097439A1 (en) 2000-10-23 2003-05-22 Strayer William Timothy Systems and methods for identifying anomalies in network data streams
US20020118682A1 (en) * 2000-12-22 2002-08-29 Myongsu Choe Apparatus and method for performing high-speed IP route lookup and managing routing/forwarding tables
US6813273B2 (en) 2001-01-19 2004-11-02 Motorola, Inc. Method and apparatus for determining existence of an address in an address look-up table
US20020129140A1 (en) 2001-03-12 2002-09-12 Ariel Peled System and method for monitoring unauthorized transport of digital content
US7225343B1 (en) 2002-01-25 2007-05-29 The Trustees Of Columbia University In The City Of New York System and methods for adaptive model generation for detecting intrusions in computer systems
US8176527B1 (en) 2002-12-02 2012-05-08 Hewlett-Packard Development Company, L. P. Correlation engine with support for time-based rules
US20040230696A1 (en) * 2003-05-15 2004-11-18 Barach David Richard Bounded index extensible hash-based IPv6 address lookup method
US20040255045A1 (en) * 2003-05-26 2004-12-16 Hyesook Lim IP address lookup method and hardware architecture using hashing
US20050018618A1 (en) 2003-07-25 2005-01-27 Mualem Hezi I. System and method for threat detection and response
US7287278B2 (en) 2003-08-29 2007-10-23 Trend Micro, Inc. Innoculation of computing devices against a selected computer virus
US8839417B1 (en) 2003-11-17 2014-09-16 Mcafee, Inc. Device, system and method for defending a computer network
US20050198468A1 (en) 2004-01-30 2005-09-08 Ati Technologies, Inc. Method and apparatus for superword register value numbering
USRE43103E1 (en) 2004-08-07 2012-01-10 Rozman Allen F System and method for protecting a computer system from malicious software
USRE43987E1 (en) 2004-08-07 2013-02-05 Rozman Allen F System and method for protecting a computer system from malicious software
USRE43528E1 (en) 2004-08-07 2012-07-17 Rozman Allen F System and method for protecting a computer system from malicious software
USRE43529E1 (en) 2004-08-07 2012-07-17 Rozman Allen F System and method for protecting a computer system from malicious software
US20070186284A1 (en) 2004-08-12 2007-08-09 Verizon Corporate Services Group Inc. Geographical Threat Response Prioritization Mapping System And Methods Of Use
US20070192863A1 (en) 2005-07-01 2007-08-16 Harsh Kapoor Systems and methods for processing data flows
US8224761B1 (en) 2005-09-01 2012-07-17 Raytheon Company System and method for interactive correlation rule design in a network security system
US20130333038A1 (en) 2005-09-06 2013-12-12 Daniel Chien Evaluating a questionable network communication
US20090158430A1 (en) 2005-10-21 2009-06-18 Borders Kevin R Method, system and computer program product for detecting at least one of security threats and undesirable computer files
US20080028463A1 (en) 2005-10-27 2008-01-31 Damballa, Inc. Method and system for detecting and responding to attacking networks
US20070180509A1 (en) 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20070294768A1 (en) 2006-01-31 2007-12-20 Deutsche Telekom Ag Method and system for detecting malicious behavioral patterns in a computer, using machine learning
US20080014873A1 (en) 2006-07-12 2008-01-17 Krayer Yvonne L Methods and apparatus for adaptive local oscillator nulling
US20080141376A1 (en) 2006-10-24 2008-06-12 Pc Tools Technology Pty Ltd. Determining maliciousness of software
US20080112413A1 (en) * 2006-11-10 2008-05-15 Fong Pong Method and system for hash table based routing via table and prefix aggregation
US20080261192A1 (en) 2006-12-15 2008-10-23 Atellis, Inc. Synchronous multi-media recording and playback with end user control of time, data, and event visualization for playback control over a network
US20090282476A1 (en) 2006-12-29 2009-11-12 Symantec Corporation Hygiene-Based Computer Security
US20080184371A1 (en) 2007-01-29 2008-07-31 Deutsche Telekom Ag method and system for detecting malicious behavioral patterns in a computer, using machine learning
US20080196104A1 (en) 2007-02-09 2008-08-14 George Tuvell Off-line mms malware scanning system and method
US20080285464A1 (en) 2007-05-17 2008-11-20 Verint Systems, Ltd. Network identity clustering
US20100100949A1 (en) 2007-07-06 2010-04-22 Abhilash Vijay Sonwane Identity and policy-based network security and management system and method
US20090216760A1 (en) 2007-08-29 2009-08-27 Bennett James D Search engine with webpage rating feedback based internet search operation
US20090106842A1 (en) 2007-10-19 2009-04-23 Durie Anthony Robert System for Regulating Host Security Configuration
US8869268B1 (en) 2007-10-24 2014-10-21 Symantec Corporation Method and apparatus for disrupting the command and control infrastructure of hostile programs
US20090150999A1 (en) 2007-12-05 2009-06-11 International Business Machines Corporation System, method and program product for detecting computer attacks
US8201245B2 (en) 2007-12-05 2012-06-12 International Business Machines Corporation System, method and program product for detecting computer attacks
US20090249484A1 (en) 2008-03-26 2009-10-01 Fraser Howard Method and system for detecting restricted content associated with retrieved content
US20100023726A1 (en) 2008-07-28 2010-01-28 Aviles Joaquin J Dual Hash Indexing System and Methodology
US20100037314A1 (en) 2008-08-11 2010-02-11 Perdisci Roberto Method and system for detecting malicious and/or botnet-related domain names
US20100071065A1 (en) 2008-09-18 2010-03-18 Alcatel Lucent Infiltration of malware communications
US8111697B1 (en) 2008-12-31 2012-02-07 Juniper Networks, Inc. Methods and apparatus for packet classification based on multiple conditions
US20110320816A1 (en) 2009-03-13 2011-12-29 Rutgers, The State University Of New Jersey Systems and method for malware detection
US20110099620A1 (en) 2009-04-09 2011-04-28 Angelos Stavrou Malware Detector
US20100284405A1 (en) 2009-05-07 2010-11-11 Ewha University Industry Collaboration Foundation Method and apparatus for searching ip address
US20120222117A1 (en) 2009-09-02 2012-08-30 Infotect Security Pte Ltd Method and system for preventing transmission of malicious contents
US8850579B1 (en) 2009-11-13 2014-09-30 SNS Soft LLC Application of nested behavioral rules for anti-malware processing
US20110154497A1 (en) 2009-12-17 2011-06-23 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20150135326A1 (en) 2009-12-17 2015-05-14 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US20110167494A1 (en) 2009-12-31 2011-07-07 Bowen Brian M Methods, systems, and media for detecting covert malware
US20110302653A1 (en) 2010-03-01 2011-12-08 Silver Tail Systems, Inc. System and Method for Network Security Including Detection of Attacks Through Partner Websites
US20110271341A1 (en) 2010-04-28 2011-11-03 Symantec Corporation Behavioral signature generation using clustering
US20120017281A1 (en) 2010-07-15 2012-01-19 Stopthehacker.com, Jaal LLC Security level determination of websites
US8413244B1 (en) 2010-11-11 2013-04-02 Symantec Corporation Using temporal attributes to detect malware
US20120167221A1 (en) 2010-12-22 2012-06-28 Electronics And Telecommunications Research Institute Apparatus for analyzing traffic
US8682812B1 (en) 2010-12-23 2014-03-25 Narus, Inc. Machine learning based botnet detection using real-time extracted traffic features
US8499348B1 (en) 2010-12-28 2013-07-30 Amazon Technologies, Inc. Detection of and responses to network attacks
US20120174225A1 (en) 2010-12-30 2012-07-05 Verisign, Inc. Systems and Methods for Malware Detection and Scanning
US8838951B1 (en) 2011-03-07 2014-09-16 Raytheon Company Automated workflow generation
US8402543B1 (en) 2011-03-25 2013-03-19 Narus, Inc. Machine learning based botnet detection with dynamic adaptation
US8578493B1 (en) 2011-05-10 2013-11-05 Narus, Inc. Botnet beacon detection
US8630294B1 (en) * 2011-05-11 2014-01-14 Juniper Networks, Inc. Dynamic bypass mechanism to alleviate bloom filter bank contention
US20120304244A1 (en) 2011-05-24 2012-11-29 Palo Alto Networks, Inc. Malware analysis system
US20120311708A1 (en) 2011-06-01 2012-12-06 Mcafee, Inc. System and method for non-signature based detection of malicious processes
US20130014253A1 (en) 2011-07-06 2013-01-10 Vivian Neou Network Protection Service
US20140298469A1 (en) 2012-02-21 2014-10-02 Logos Technologies Llc System for detecting, analyzing, and controlling infiltration of computer and network systems
US20130246651A1 (en) * 2012-03-13 2013-09-19 Juniper Networks, Inc. Longest prefix match searches with variable numbers of prefixes
US20130343388A1 (en) 2012-06-21 2013-12-26 Jonathan Stroud Binding of network flows to process threads
US20140075557A1 (en) 2012-09-11 2014-03-13 Netflow Logic Corporation Streaming Method and System for Processing Network Metadata
US8762948B1 (en) 2012-12-20 2014-06-24 Kaspersky Lab Zao System and method for establishing rules for filtering insignificant events for analysis of software program
US20140207917A1 (en) 2013-01-22 2014-07-24 Netcitadel, Inc. System, apparatus and method for dynamically updating the configuration of a network device
US20150098470A1 (en) * 2013-10-04 2015-04-09 Broadcom Corporation Hierarchical hashing for longest prefix matching
US20150358290A1 (en) 2014-06-04 2015-12-10 Nicira, Inc. Use of stateless marking to speed up stateful firewall rule processing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Marcel Waldvogel et al, Scalable High Speed IP Routing Lookups, 1997, SIGCOMM, pp. 25-36 (Year: 1997). *
Notice Prior to Allowance of Israelian Patent Application No. 233776 dated Nov. 19, 2018.
Notice regarding allowance of Israelian patent No. 233776 dated Feb. 21, 2019.

Also Published As

Publication number Publication date
US10630588B2 (en) 2020-04-21
IL233776B (en) 2019-02-28
US20200296041A1 (en) 2020-09-17
US20160028631A1 (en) 2016-01-28

Similar Documents

Publication Publication Date Title
US11463360B2 (en) System and method for range matching
US10732851B2 (en) Hybrid memory device for lookup operations
US8854972B1 (en) Security device implementing flow lookup scheme for improved performance
US9627063B2 (en) Ternary content addressable memory utilizing common masks and hash lookups
US8027330B2 (en) Efficient classification of network packets
US8442931B2 (en) Graph-based data search
US9159420B1 (en) Method and apparatus for content addressable memory parallel lookup
US9294390B2 (en) Hash table storage and search methods and devices
US9253090B2 (en) System and method for reduced forwarding information storage
US10536549B2 (en) Method and apparatus to accelerate session creation using historical session cache
US9270636B2 (en) Neighbor lookup operations in a network node
Yang et al. Fast OpenFlow table lookup with fast update
KR101311031B1 (en) A multi bloom filter including a detecting bloom filter
US10681007B2 (en) String search and matching for gate functionality
CN107147581B (en) Maintenance method and device for routing table entry
US11818099B2 (en) Efficient matching of feature-rich security policy with dynamic content using user group matching
US20170012874A1 (en) Software router and methods for looking up routing table and for updating routing entry of the software router
US11888743B1 (en) Network device storage of incremental prefix trees
US20160301658A1 (en) Method, apparatus, and computer-readable medium for efficient subnet identification
CN109688237B (en) NAT (network Address translation) conversion method and device and NAT equipment
CN112187743B (en) Network policy matching method and system based on IP address longest prefix
Lee et al. Hybrid memory-efficient multimatch packet classification for NIDS
CN103368852A (en) Method and system for processing hash conflict
CN107948091B (en) Method and device for classifying network packets
Lee et al. Approaches for improving tuple space search-based table lookup

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: VERINT SYSTEMS LTD., ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YISHAY, YITSHAK;REEL/FRAME:052510/0982

Effective date: 20150813

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

Free format text: NON FINAL ACTION COUNTED, NOT YET MAILED

AS Assignment

Owner name: COGNYTE TECHNOLOGIES ISRAEL LTD, ISRAEL

Free format text: CHANGE OF NAME;ASSIGNOR:VERINT SYSTEMS LTD.;REEL/FRAME:060751/0532

Effective date: 20201116

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

AS Assignment

Owner name: COGNYTE TECHNOLOGIES ISRAEL LTD, ISRAEL

Free format text: CHANGE OF NAME;ASSIGNOR:VERINT SYSTEMS LTD.;REEL/FRAME:059710/0753

Effective date: 20201116

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE